In part one of this two-part series, we discussed why organizations should adopt a SIEM solution to ensure network security. In this second part, we’ll be demystifying the critical capabilities of SIEM tools and show you what to consider …

There’s no doubt that the General Data Protection Regulation (GDPR) is one of the most highly anticipated regulatory mandates of the last decade. With May 25—the deadline to comply with the GDPR—just around the corner, you have less than 30 …

Security information and event management (SIEM) helps with managing and analyzing the vast amount of log information generated by networks. Of all the capabilities of SIEM, event correlation is the most powerful. This technique analyzes log …

Log management is a pillar of security information and event management (SIEM), and is critical to any organization’s security strategy. Logs document every event that occurs on your network, and therefore have the power to inform you about various security …

In terms of collaboration, Structured Threat Information eXpression (STIX) and Trusted Automated eXchange of Indicator Information (TAXII) represent a revolution in the security industry. These protocols transformed the field of threat intelligence from a fragmented collection of information to a …

Before we jump into the third part of this GDPRblog series, let’s take a moment to think about a few questions. Such as, why are compliance mandates necessary? Are they framed to just prevent data breaches? …

In December, we released EventLog Analyzer 11.3, which automatically discovers Windows devices from Active Directory and workgroups. This greatly simplifies the process of configuring Windows devices for log collection.

When people talk about SIEM, they don’t usually focus on usability. Vendors tend to focus strictly on log processing capabilities. To be fair, you want your SIEM solution to have cutting edge threat mitigation features. But at the same time, …

Log data can be massive even in small organizations. Many of these logs might just be routine messages that don’t concern you, but others contain data that is critical to your network’s security. You want your security information …

It’s that time of the year again when as the leaves fall, we brace ourselves for copious amounts of pumpkin in our diet and the possibility of running into a monster on an evening stroll. This Halloween, tell us what…